The unique name used to identify this local Tuxedo access point.
This name should be unique for all local and remote Tuxedo access
points defined within a WTC Service. This allows you to define
unique configurations having the same Access Point ID.

The conditions under which this local Tuxedo access point
establishes a session connection with a remote Tuxedo access
point.

The connection policies are:

ON_DEMAND: A connection is attempted only when requested by
either a client request to a remote service or an administrative
connect command.

ON_STARTUP: A domain gateway attempts to establish a connection
with its remote Tuxedo access points at gateway server
initialization time. Remote services (services advertised in JNDI
by the domain gateway for this local access point) are advertised
only if a connection is successfully established to that remote
Tuxedo access point. If there is no active connection to a remote
Tuxedo access point, then the remote services are suspended. By
default, this connection policy retries failed connections every 60
seconds. Use the MaxRetry and RetryInterval values to specify
application specific values.

INCOMING_ONLY: A domain gateway does not attempt an initial
connection to remote Tuxedo access points at startup and remote
services are initially suspended. The domain gateway is available
for incoming connections from remote Tuxedo access points and
remote services are advertised when the domain gateway for this
local Tuxedo access point receives an incoming connection.
Connection retry processing is not allowed.

The principal name used to verify the identity of this domain
when establishing a connection to another domain.

Note: This parameter only applies to domains of type
TDOMAIN that are running Oracle Tuxedo 7.1 or later software. If
not specified, the connection principal name defaults to the
AccessPointID for this domain.ConnPrincipalName.

The custom identity keystore's passphrase. If empty or null,
then the keystore will be opened without a passphrase.

This attribute is only used if KeyStores is "Custom Stores".

When you get the value of this attribute, WebLogic Server does
the following:

Retrieves the value of the
IdentityKeyStorePassPhraseEncrypted attribute.

Decrypts the value and returns the unencrypted password as a
String.

When you set the value of this attribute, WebLogic Server does
the following:

Encrypts the value.

Sets the value of the
CustomIdentityKeyStorePassPhraseEncrypted attribute to
the encrypted value.

Using this attribute
(CustomIdentityKeyStorePassPhrase) is a potential
security risk because the String object (which contains the
unencrypted password) remains in the JVM's memory until garbage
collection removes it and the memory is reallocated. Depending on
how memory is allocated in the JVM, a significant amount of time
could pass before this unencrypted data is removed from memory.

Instead of using this attribute, use
CustomIdentityKeyStorePassPhraseEncrypted.

The identity keystore's encrypted passphrase. If empty or null,
then the keystore will be opened without a passphrase.

This attribute is only used if KeyStores is "Custom Stores".

To set this attribute, use
weblogic.management.EncryptionHelper.encrypt() to
encrypt the value. Then set this attribute to the output of the
encrypt() method.

To compare a password that a user enters with the encrypted
value of this attribute, use the same WebLogic Server instance that
you used to set and encrypt this attribute and use
weblogic.management.EncryptionHelper.encrypt() to
encrypt the user-supplied password. Then compare the encrypted
values.

Specifies whether this local Tuxedo access point interoperates
with remote Tuxedo access points that are based upon Tuxedo release
6.5. If this value is set to Yes, the local Tuxedo
access point interoperates with a Tuxedo 6.5 domain.

Return value that tells whether this local Tuxedo access point
requires the acknowledgement of Application Level Keep Alive, and
how long it will wait without receiving acknowledgement before
declare the connection is inaccessible.

Provides the configuration rule to be used for finding Local
Access Point's identity key store and trust key store. In plain
text, it contains information on where the identity key store and
trust key store are configured. When KeyStoreLocation is configured
with WLS Store, WTC uses configuration information
from the WLS Key Stores configuration. Otherwise, it uses the key
stores information configured in the Local Access Point.

Optional information that you can include to describe this
configuration.

WebLogic Server saves this note in the domain's configuration
file (config.xml) as XML PCDATA. All left angle
brackets (<) are converted to the XML entity
&lt;. Carriage returns/line feeds are
preserved.

Note:

If you create or edit a note from the Administration Console,
the Administration Console does not preserve carriage returns/line
feeds.

The network address and port number of this local Tuxedo access
point.

Specify the address in one of the following formats:

TCP/IP address in the format //hostname:port_number
or //#.#.#.#:port_number.

SDP address in the format
sdp://hostname:port_number or
sdp://#.#.#.#:port_number.

Notes:

If the hostname is used, the access point finds an address for
hostname using the local name resolution facilities (usually DNS).
If dotted decimal format is used, each # should be a number from 0
to 255. This dotted decimal number represents the IP address of the
local machine. The port_number is the TCP/SDP port number at which
the access point listens for incoming requests.

If SDP format address is specified, the transport protocol for
this access point is SDP instead of TCP. This feature is only
available when WTC and Tuxedo domain gateway are both deployed on
Oracle Exalogic platform. Requires Tuxedo 11gR1PS2 and higher.

The passphrase used to retrieve the server's private key from
the keystore. This passphrase is assigned to the private key when
it is generated.

When you get the value of this attribute, WebLogic Server does
the following:

Retrieves the value of the
PrivateKeyPassPhraseEncrypted attribute.

Decrypts the value and returns the unencrypted passphrase as a
String.

When you set the value of this attribute, WebLogic Server does
the following:

Encrypts the value.

Sets the value of the PrivateKeyPassPhraseEncrypted
attribute to the encrypted value.

Using this attribute (PrivateKeyPassPhrase) is a
potential security risk because the String object (which contains
the unencrypted passphrase) remains in the JVM's memory until
garbage collection removes it and the memory is reallocated.
Depending on how memory is allocated in the JVM, a significant
amount of time could pass before this unencrypted data is removed
from memory.

Instead of using this attribute, use
getPrivateKeyPassPhraseEncrypted.

The encrypted passphrase used to retrieve the Local Tuxedo
access point's private key from the keystore. This passphrase is
assigned to the private key when it is generated.

To set this attribute, use
weblogic.management.EncryptionHelper.encrypt() to
encrypt the value. Then set this attribute to the output of the
encrypt() method.

To compare a password that a user enters with the encrypted
value of this attribute, go to the same WebLogic Server instance
that you used to set and encrypt this attribute and use
weblogic.management.EncryptionHelper.encrypt() to
encrypt the user-supplied password. Then compare the encrypted
values.

The trust keystore's passphrase. If empty or null, then the
keystore will be opened without a passphrase.

This attribute is only used if KeyStores is "Custom Stores".

When you get the value of this attribute, WebLogic Server does
the following:

Retrieves the value of the
TrustKeyStorePassPhraseEncrypted attribute.

Decrypts the value and returns the unencrypted password as a
String.

When you set the value of this attribute, WebLogic Server does
the following:

Encrypts the value.

Sets the value of the
TrustKeyStorePassPhraseEncrypted attribute to the
encrypted value.

Using this attribute (TrustKeyStorePassPhrase) is a
potential security risk because the String object (which contains
the unencrypted password) remains in the JVM's memory until garbage
collection removes it and the memory is reallocated. Depending on
how memory is allocated in the JVM, a significant amount of time
could pass before this unencrypted data is removed from memory.

Instead of using this attribute, use
TrustKeyStorePassPhraseEncrypted.

The trust keystore's encrypted passphrase. If empty or null,
then the keystore will be opened without a passphrase.

This attribute is only used if KeyStores is "Custom Stores".

To set this attribute, use
weblogic.management.EncryptionHelper.encrypt() to
encrypt the value. Then set this attribute to the output of the
encrypt() method.

To compare a password that a user enters with the encrypted
value of this attribute, use the same WebLogic Server instance that
you used to set and encrypt this attribute and use
weblogic.management.EncryptionHelper.encrypt() to
encrypt the user-supplied password. Then compare the encrypted
values.

If the specified attribute has not been set explicitly, and if
the attribute has a default value, this operation forces the MBean
to persist the default value.

Unless you use this operation, the default value is not saved
and is subject to change if you update to a newer release of
WebLogic Server. Invoking this operation isolates this MBean from
the effects of such changes.

Note:

To insure that you are freezing the default value, invoke the
restoreDefaultValue operation before you invoke
this.

This operation has no effect if you invoke it on an attribute
that does not provide a default value or on an attribute for which
some other value has been set.